 
View Full Version : RCE Cryptographics
	-  piratebay heml.is (3 replies)
-  RSA things!!!! (5 replies)
-  strange CRC algorithm (1 replies)
-  Practical attack on RC4 encryption (1 replies)
-  Breaking a challenge response (5 replies)
-  PMK , HMK , EMM SEED , EMM IV  in IRDETO 2 (0 replies)
-  Delphi RNG reversing (24 replies)
-  Algorithm for Seed Key (2 replies)
-  Any books on breaking simple codes found in malware? (14 replies)
-  Rijndael S-Box? AES... Maybe even XOR? -- Examples (0 replies)
-  Extract hash for offline attack (Office 2007) (1 replies)
-  Similar to XTEA ? (4 replies)
-  anyone know what type of hash this is? (2 replies)
-  Crypto Scheme (6 replies)
-  decrypt with RSA? (3 replies)
-  How can I check quickly if a pdf is decrypted right? (5 replies)
-  Adobe Security handler cryptversion and 'NewCryptDataExProc' function question (4 replies)
-  Hash idea (1 replies)
-  DES in ASM (6 replies)
-  Mask attack with the fastest MD5 cracker (1 replies)
-  GPU Cryptography (1 replies)
-  how to decrypt JCALG1 any body can help me (1 replies)
-  a simple substitution cipher or not? (3 replies)
-  Cryption (7 replies)
-  How to attack crypto algorithms (4 replies)
-  Whitebox crypto crackme ? (5 replies)
-  I need help with this crypto algorithm (0 replies)
-  Bday Attack on Flexlm's ECC? (6 replies)
-  encrypted harddisk (13 replies)
-  ElGamal with non relative prime k to p-1 ? (5 replies)
-  White-Box Cryptography (10 replies)
-  Is RSA safe in software protection  ? - on XP crypto.api  example (8 replies)
-  BCH Codes (3 replies)
-  Recovering deleted files from HDD (11 replies)
-  RSA Guide (11 replies)
-  Checksum problem (7 replies)
-  Black box algorithm with some known good keys (7 replies)
-  what cryptology Algorithm is it ? (3 replies)
-  SHA-1 Collision Search - New approach (4 replies)
-  Reverse Engineering of Strong Crypto Signature Schemes (16 replies)
-  QRBG (2 replies)
-  rijndael (2 replies)
-  Help on checksum analysis (8 replies)
-  Adobe Digital Editions DRM (13 replies)
-  help with crypto identification (1 replies)
-  Generate Your Own MD5 Collisions In Under a Minute (12 replies)
-  Breaking 104 bit WEP in less than 60 seconds (3 replies)
-  Experience with AES-128 (10 replies)
-  Online Cryptography Course, Washington Uni (0 replies)
-  Product Keys Based on Elliptic Curve Cryptography (0 replies)
-  MD5: how to compile win32 Console code? (8 replies)
-  DES - ASM to C (11 replies)
-  Blowfish2 (12 replies)
-  Interesting Crypto Function (2 replies)
-  Handbook of Applied Cryptography (1 replies)
-  Practical Aspects of Modern Cryptography (2 replies)
-  LINK: Steganography in Computer Graphics (1 replies)
-  Fibonacci and Primes (10 replies)
-  Bruteforcing DES (4 replies)
-  B4 I start coding: Does my algorithm make sense ? Picture/Diagram inside (16 replies)
-  Can someone help me figure out if this is standard blowfish ? (ASM) (4 replies)
-  function analysis (4 replies)
-  Skype in coporate environments (1 replies)
-  Checksum theory check...sum (15 replies)
-  Any one see this Cryptographic? (11 replies)
-  a piece code of a unknow cryptogrphics (16 replies)
-  Exploiting MD5 (10 replies)
-  Recover Key from encryption (7 replies)
-  .dat decrytion (2 replies)
-  rsa Questions (6 replies)
-  GData: An Online MD5 Hash Database (6 replies)
-  strong? Possible attacks? (2 replies)
-  Nice MD5 Collision! (2 replies)
-  Locality-sensitive hash functions (0 replies)
-  file.exe with 13 crypto signatures, help... (4 replies)
-  Anyone worked on RC4 ? (2 replies)
-  Weak-Key Classes  attaks on IDEA algo (3 replies)
-  HardKey4 (1 replies)
-  A question about MD5 (3 replies)
-  XOR equations :) (0 replies)
-  XOR property (MD4/5 related) (9 replies)
-  Breaking a challenge / response algo (4 replies)
-  ec problem (3 replies)
-  DES question (3 replies)
-  Q:Number analysis... (12 replies)
-  Literal Bitwise Calculations (13 replies)
-  Is this real ? (2 replies)
-  Article: The Misuse of RC4 in Microsoft Word and Excel (0 replies)
-  PSDS_Crypto (panasonic crypto) (8 replies)
-  Article about next-generation movie/DVD encryption (0 replies)
-  Steganos Encrypted File and forgotten Password (7 replies)
-  How to implement (20 replies)
-  A little help in understanding some crypto (11 replies)
-  Collision vulnerabilities in MD5 Checksums (7 replies)
-  RSA implementation (13 replies)
-  hash algo help (5 replies)
-  RSA - More than 2 primes (1 replies)
-  MD4/MD5/SHA-0 Dead (4 replies)
-  Man in the middle (8 replies)
-  new article about ECC (1 replies)
-  Complexity of HASH algoritm (6 replies)
-  Cryptanalysis questions (6 replies)
-  Will RSA-640 be solved soon? (1 replies)
-  LFSR-based cypher analysis (7 replies)
-  Is it illegal to solve an RSA code? (5 replies)
-  got P,Q,D, how to compute E? (13 replies)
-  Okay, ultimate challange i belive (41 replies)
-  Project RainbowCrack (6 replies)
-  Decoding TwoFish Encryption (2 replies)
-  Lets put those graphic processors to use (2 replies)
-  Acoustic cryptanalysis (2 replies)
-  Safer-K128 (2 replies)
-  Windows DRM and WMV (8 replies)
-  Tiny Encryption Algorythm (3 replies)
-  link problem using MS Visual c++6.0 when useing Cryptlib (5 replies)
-  New in crypto (9 replies)
-  problem with rsa (29 replies)
-  simple rsa (4 replies)
-  miracle sig files (5 replies)
-  Adobe DRM (Digital Right Management) (13 replies)
-  MD5 + some bit math (4 replies)
-  Interesting Docs (2 replies)
-  RSA 576 factored (2 replies)
-  Mind Challenge...(or not?!) (7 replies)
-  Cryptlib - setting IV's (5 replies)
-  microsoft drm (1 replies)
-  ECC questions (4 replies)
-  Writing RSA keys to keyset - permission errors (6 replies)
-  Could I ask u how to fix the problem in the mentioned keygenRSA.asm? (2 replies)
-  Diffie Hellman Key Agreement - Cryptlib??? (4 replies)
-  Little simple doubt in Handbook of Applied Cryptography... (12 replies)
-  DES 40bit (1 replies)
-  Crypto Library Help Please! (4 replies)
-  elliptic distribution (2 replies)
-  WINZIP Archive decrypt (3 replies)
-  des modified algo (1 replies)
-  recover RSA primes p and q if we have n,d,e (8 replies)
-  Attacking DSA (14 replies)
-  IShield Single Exe password recovery? (1 replies)
-  A nice intro to Cryptography (5 replies)
-  bug in FGInt lib? (RSA) (3 replies)
-  NeoProject takes on MD5 (0 replies)
-  new primality testing algorithm? (1 replies)
-  RSA-576 - Factored (9 replies)
-  knapsack (0 replies)
-  NeoProject (8 replies)
-  ServU Ftp Password Decryption (1 replies)
-  Ecdsa (1 replies)
-  help me on reversing hash function (10 replies)
-  ElGamal Signature (22 replies)
-  Tea (19 replies)
-  Recognizing .... (10 replies)
-  Call for Mike's comments (2 replies)
-  Question about ECC points addition... (6 replies)
-  BigNum Calc (3 replies)
-  xor protection (6 replies)
-  Blowfish (14 replies)
-  unknown algorithm (2 replies)
-  Typical code sequence for encryption? (4 replies)
-  Data structure for big Integer (9 replies)
-  Encryption modes (23 replies)
-  Pencil and paper decryption ? (11 replies)
-  Inside a MD5 (?) protected Java prog (7 replies)
-  Marx Cryptobox (2 replies)
-  Zip Protection Question? (4 replies)
-  Primality testing *is* in P - Proof (3 replies)
-  JBuilder 7 and DSA (22 replies)
-  Bob and Alice (6 replies)
-  Hash algorithm identification (9 replies)
-  Interesting site (1 replies)
-  Um few crypto newbie questions. (5 replies)
-  New project:  RSA-65 analysis on GetDataBack for NTFS (6 replies)
-  Blowfish Bruteforce 48 bits (2 replies)
-  $$$ for crypto weakness in a cool simple algorithm (4 replies)
-  Need help with foxpro please (7 replies)
-  SHA-1 protected program (4 replies)
-  Cryptic Formula Help (8 replies)
-  RSA-Tool2 v1.7 Request (4 replies)
-  Encryption used in CRT (13 replies)
-  SSleay BIGNUM FLIRT sigs (1 replies)
-  Searching RSA Protected Programs (7 replies)
-  Help determining cypher... (6 replies)
-  i search Rsa-tools (3 replies)
-  Blowfish and SHA-1 analysis on cacheX (18 replies)
-  8 bit CPU cipher (16 replies)
-  hypercomplex numbers and RSA (0 replies)
-  What kind of encryption is this? (3 replies)
-  SHA-1 combined with RSA? (9 replies)
-  Blowfish Init<>set_key (13 replies)
-  public-key based Delphi  components protection: SLockPK (24 replies)
-  super-tiny PRNG (7 replies)
-  Blum-Blum-Shub questions (4 replies)
-  Encrypted Magic Folders (2 replies)
-  prime number properties (10 replies)
-  Subexponential attack on AES (0 replies)
-  Random Number Analysis (22 replies)
-  RSA Tool 2 v1.2 (2 replies)
-  Finding RSA Constants for keygenning... (3 replies)
-  Cracking w97 files (14 replies)
-  new winzip attack (0 replies)
-  WinZip cipher (43 replies)
-  stream cipher??? (28 replies)
-  Grille Me (8 replies)
-  need ideas on how to attack an Authentication and Encryption model I thought of (4 replies)
-  Tutorial: finding encryption code (11 replies)
-  Analysis of ASProtect Keygeneration scheme (3 replies)
-  why not decrypt in exe ? (3 replies)
-  Challenge to all you so brilliant people...with motivation ;) (15 replies)
-  decrypting an unknown file type (3 replies)
-  fun proof (1 replies)
-  RSA cracker machine (9 replies)
-  Easy RSA (9 replies)
-  bit commitment blues ;) (1 replies)
-  Cryptography challenge ;) (2 replies)
-  tE!'s RSA Tool (3 replies)
-  Alittle bit of Encryption/Decryption fun... (0 replies)
-  Rsa Challenge (10 replies)
-  SecureID program!? (4 replies)
-  rsa (1 replies)
-  Dsa (12 replies)
-  RNG and relative primes (6 replies)
-  Beginners question (4 replies)
-  Inside Windows Product Activation (WPA) (6 replies)
-  help on a llittle crypto mission : -) (4 replies)
-  MD5 works but RIPEMD-160 does not work (6 replies)
-  A challenge ? (10 replies)
-  E changed to 1 in RSA algo. (1 replies)
-  Secrets & Lies (14 replies)
-  How to know which algo is used ? (7 replies)
-  Cryptography's Shining Ciphers (5 replies)
-  TMG keygenme #3 (7 replies)
-  ECC and Flexlm (6 replies)
-  xtr help :[ (2 replies)
-  Basics of Cryptography (14 replies)
-  Rsa > 512 (16 replies)
-  a newb ie question? (6 replies)
-  Crypto api test problems (3 replies)
-  Cryptography ( As posted by EtErNaL_L0ser) (24 replies)
 
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.